Cybersecurity’s Black Hole

The internet’s biggest advantage and its greatest disadvantage is its ability to spread information quickly. Most of the time, the information shared is beneficial, however criminals use that same instant spread of information to pass hacking tools. The Blackhole exploit kit is such a resource, and it accounts for 28% of all web threats.

GovDefenders Wednesdays: What is Ransomware & Why Is It a Threat?

The Ransomware Threat Neal Stephenson’s most recent novel REAMDE is a 1,000-page technology thriller that I recommend to those of you who enjoy complex novels. Stephenson develops the plot from the consequences of a hacker in Asia who uses ransomware to encrypt a hard drive containing a list of thousands of stolen credit card records. The hacker promises a decryption key to unlock the hard drive upon payment of a ransom fee. What the poor hacker does not realize is that the Russian mafia had previously purchased the stolen credit card data for a large sum of money and now cannot use it. As you may surmise, mayhem ensues across several continents.

The War on Cybersecurity

Cyber Warriors. Cyber Warfare. Cyberattacks. NetWars. Cyberkills.

These offensive-minded buzzwords are moving the conversation away from what really counts when protecting your networked assets: defense. Make no mistake, there is a war on cybersecurity and it could be distracting you.

Security is defined as “the quality or state of being safe.” Its function is protection. But more organizations are choosing a new cybersecurity mantra: “The best defense is a good offense.” This is wrong.

Cybersecurity Wednesdays: Information Security Continuous Monitoring (ISCM) Enabling Technologies: Can You Name Them?

Cybersecurity Wednesdays is written by Van Ristau, DLT Solutions’ Chief Technology Officer. Throughout the month, he’ll explore the world of public sector cybersecurity; introducing concepts, offering opinions, providing resources, and identifying ways to protect your agency. You may also follow Van on Twitter at @VanRistau.

GovDefenders Wednesdays: Continuous Monitoring is not like a Mobius Strip: How to get in the Loop

GovDefenders Wednesdays is a weekly written by Van Ristau, DLT Solutions’ Chief Technology Officer. Throughout the month, he’ll explore the world of public sector cybersecurity; introducing concepts, offering opinions, providing resources, and identifying ways to protect your agency. Follow Van at @VanRistau for additional news.

October is National Cyber Security Awareness Month

Children won’t be the only ones trick-or-treating this month. Last year, federal agencies reported an estimated 3,574 incidents every month in 2011 according to the Government Accountability Office. The same office also said incidents reported have increased nearly 680% in the last six years. Due to rising cyber terrorism and the need for increased cyber security, President Obama has designated October “National Cyber Security Awareness Month”.

Online Identity: Evolve or Perish!

The following noteworthy identity management statement comes from the Cyberspace Policy Review issued last year by President Obama: “Build a cybersecurity-based identity management vision and strategy that addresses privacy and civil liberties interests, leveraging privacy-enhancing technologies for the Nation.” To be clear, I am an avid opponent of “anonymity for all” on the web. I do not think it is in our common interest to have anonymous communication in the public sector. I know that I will draw the ire of many who view the Internet as a constitutional right, but I persist with this view because the very nature of our constitution provides for the free and open exchange of ideas in the public forum. With this protection in place why would we need anonymity given the extreme handicap that it places on us in processing information?